Method and device for determining users sending spam short messages
A technology of spam SMS and SMS, applied in wireless communication, electrical components, message/mail/announcement, etc., can solve problems such as low reliability and difficulty in determining trust degree.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0070] see figure 1 , a flow chart of a method for determining a spam message sending user provided in Embodiment 1, specifically including:
[0071] Step S101, counting the volume of short message bills of users;
[0072] Step S102, comparing the user's short message bill amount with the configured threshold value of the short message bill amount;
[0073] Step S103, calculating the user's short message dispersion;
[0074] Step S104, comparing the user's short message dispersion with the configured short message dispersion threshold;
[0075] Step S105, analyze the comparison result of step S102 and step S104, determine whether the user is a junk message sending user, perform step S106 or perform step S107 respectively;
[0076] Step S106, determining that the user is a spam sending user;
[0077] Step S107, determining that the user is not a spam sending user.
[0078] The above step S102 and step S103 have no sequential relationship in sequence.
[0079] In the above...
Embodiment 2
[0094] Embodiment 2 On the basis of Embodiment 1, user categories are further divided according to user attributes, and the SMS bill amount threshold value and corresponding SMS dispersion threshold value corresponding to each user category are configured to further more accurately determine the Spam text messages to send users.
[0095] First, collect user-related data, including point-to-point billing system bills, user profile attribute records, voice call bills, user consumption behavior records, user credit-related behavior records, and customer service system spam complaint list. in:
[0096] The call list of the point-to-point billing system includes, for example: point-to-point SMS sending time, sending number, peer number, communication fee, SMS center number, etc.;
[0097] User profile attribute records include, for example: brand type, package type, customer type, whether it is a major customer, group ID (ID), online time, whether the user profile is authentic, mini...
Embodiment 3
[0108] Embodiment 3 On the basis of Embodiment 2, the SMS call volume threshold and the SMS dispersion threshold are subdivided to determine users who send spam messages and further distinguish suspicious users who send spam messages.
[0109] The specific solution is: the threshold value of the bill amount of the short message includes the threshold value of the first bill amount of the short message and the threshold value of the second bill amount of the short message, wherein, the threshold value of the first bill amount of the short message is greater than the threshold value of the second bill amount of the short message Threshold value;
[0110] The short message dispersion threshold includes a first short message dispersion threshold and a second short message dispersion threshold, wherein the first short message dispersion threshold is greater than the second short message dispersion threshold;
[0111] When comparing the user's SMS bill volume with the configured SMS...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 